167 lines
7.1 KiB
Plaintext
167 lines
7.1 KiB
Plaintext
# Nmap 6.47 scan initiated Sun Apr 17 21:00:01 2016 as: /usr/bin/nmap -A -oN /home/benedikt/projects/nk-scans/nmap/nk-Star-KP.%d-%m-%Y.txt -oG /home/benedikt/projects/nk-scans/nmap/nk-Star-KP.%d-%m-%Y.grep 175.45.176.0/22
|
|
Nmap scan report for 175.45.176.19
|
|
Host is up (0.38s latency).
|
|
Not shown: 998 filtered ports
|
|
PORT STATE SERVICE VERSION
|
|
80/tcp open http Apache httpd 2.2.3 ((Red Hat))
|
|
|_http-generator: ERROR: Script execution failed (use -d to debug)
|
|
|_http-methods: No Allow or Public header in OPTIONS response (status code 200)
|
|
| http-robots.txt: 1 disallowed entry
|
|
|_/wp-admin/
|
|
|_http-title: Did not follow redirect to http://starcon.net.kp/
|
|
443/tcp open ssl/http Apache httpd 2.2.3 ((Red Hat))
|
|
|_http-generator: ERROR: Script execution failed (use -d to debug)
|
|
|_http-methods: No Allow or Public header in OPTIONS response (status code 200)
|
|
| http-robots.txt: 1 disallowed entry
|
|
|_/wp-admin/
|
|
|_http-title: Did not follow redirect to https://starcon.net.kp/
|
|
| ssl-cert: Subject: commonName=localhost.localdomain/organizationName=SomeOrganization/stateOrProvinceName=SomeState/countryName=--
|
|
| Not valid before: 2016-01-31T23:57:03+00:00
|
|
|_Not valid after: 2017-01-30T23:57:03+00:00
|
|
|_ssl-date: 2016-04-17T12:26:28+00:00; -8h39m42s from local time.
|
|
|
|
Nmap scan report for 175.45.178.170
|
|
Host is up (0.38s latency).
|
|
Not shown: 995 closed ports
|
|
PORT STATE SERVICE VERSION
|
|
22/tcp open ssh OpenSSH 5.3 (protocol 2.0)
|
|
| ssh-hostkey:
|
|
| 1024 7a:cf:f8:3e:27:75:cc:38:a2:c5:cf:a7:54:9d:91:cf (DSA)
|
|
|_ 2048 01:a6:61:a6:95:15:87:8b:64:58:dc:63:cf:31:a0:1c (RSA)
|
|
111/tcp open rpcbind 2-4 (RPC #100000)
|
|
| rpcinfo:
|
|
| program version port/proto service
|
|
| 100000 2,3,4 111/tcp rpcbind
|
|
| 100000 2,3,4 111/udp rpcbind
|
|
| 100024 1 37789/udp status
|
|
|_ 100024 1 40439/tcp status
|
|
3128/tcp open http-proxy Squid http proxy 3.1.10
|
|
|_http-methods: No Allow or Public header in OPTIONS response (status code 400)
|
|
|_http-title: ERROR: The requested URL could not be retrieved
|
|
4444/tcp filtered krb524
|
|
5989/tcp open ssl/http Web-Based Enterprise Management CIM serverOpenPegasus WBEM httpd
|
|
|_http-methods: No Allow or Public header in OPTIONS response (status code 501)
|
|
|_http-title: Site doesn't have a title.
|
|
| ssl-cert: Subject: commonName=jong2/organizationName=The Open Group/stateOrProvinceName=Berkshire/countryName=UK
|
|
| Not valid before: 2016-04-13T07:16:41+00:00
|
|
|_Not valid after: 2026-04-11T07:16:41+00:00
|
|
|_ssl-date: 2016-04-17T20:37:11+00:00; -28m59s from local time.
|
|
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
|
|
|
|
Nmap scan report for 175.45.178.177
|
|
Host is up (0.37s latency).
|
|
All 1000 scanned ports on 175.45.178.177 are closed
|
|
|
|
Nmap scan report for 175.45.178.178
|
|
Host is up (0.37s latency).
|
|
Not shown: 992 closed ports
|
|
PORT STATE SERVICE VERSION
|
|
80/tcp filtered http
|
|
135/tcp filtered msrpc
|
|
139/tcp filtered netbios-ssn
|
|
443/tcp open ssl/http Apache httpd
|
|
|_http-methods: No Allow or Public header in OPTIONS response (status code 200)
|
|
|_http-title: Site doesn't have a title (text/html; charset=UTF-8).
|
|
| ssl-cert: Subject: commonName=NetRadar/organizationName=NeoTech/stateOrProvinceName=XX/countryName=XX
|
|
| Not valid before: 2014-09-04T15:54:32+00:00
|
|
|_Not valid after: 2044-08-27T15:54:32+00:00
|
|
|_ssl-date: 2016-04-17T20:30:15+00:00; -36m04s from local time.
|
|
445/tcp filtered microsoft-ds
|
|
593/tcp filtered http-rpc-epmap
|
|
3306/tcp filtered mysql
|
|
4444/tcp filtered krb524
|
|
|
|
Nmap scan report for 175.45.178.179
|
|
Host is up (0.38s latency).
|
|
Not shown: 997 closed ports
|
|
PORT STATE SERVICE VERSION
|
|
22/tcp open ssh OpenSSH 5.3 (protocol 2.0)
|
|
| ssh-hostkey:
|
|
| 1024 90:15:48:98:36:a2:f8:08:e9:98:81:e9:f0:90:5b:1d (DSA)
|
|
|_ 2048 84:d9:48:f5:01:3a:70:6a:58:e2:5b:c5:d7:83:58:ef (RSA)
|
|
80/tcp open http Apache httpd 2.2.15 ((Red Hat))
|
|
| http-methods: Potentially risky methods: TRACE
|
|
|_See http://nmap.org/nsedoc/scripts/http-methods.html
|
|
|_http-title: Test Page for the Apache HTTP Server on Red Hat Enterprise Linux
|
|
6000/tcp open X11 (access denied)
|
|
Service Info: OS: Unix
|
|
|
|
Nmap scan report for 175.45.178.180
|
|
Host is up (0.37s latency).
|
|
Not shown: 997 closed ports
|
|
PORT STATE SERVICE VERSION
|
|
22/tcp open ssh OpenSSH 5.3 (protocol 2.0)
|
|
| ssh-hostkey:
|
|
| 1024 90:15:48:98:36:a2:f8:08:e9:98:81:e9:f0:90:5b:1d (DSA)
|
|
|_ 2048 84:d9:48:f5:01:3a:70:6a:58:e2:5b:c5:d7:83:58:ef (RSA)
|
|
80/tcp open http Apache httpd 2.2.15 ((Red Hat))
|
|
| http-methods: Potentially risky methods: TRACE
|
|
|_See http://nmap.org/nsedoc/scripts/http-methods.html
|
|
|_http-title: Test Page for the Apache HTTP Server on Red Hat Enterprise Linux
|
|
6000/tcp open X11 (access denied)
|
|
Service Info: OS: Unix
|
|
|
|
Nmap scan report for 175.45.178.181
|
|
Host is up (0.37s latency).
|
|
Not shown: 992 closed ports
|
|
PORT STATE SERVICE VERSION
|
|
22/tcp open ssh OpenSSH 5.3 (protocol 2.0)
|
|
| ssh-hostkey:
|
|
| 1024 90:15:48:98:36:a2:f8:08:e9:98:81:e9:f0:90:5b:1d (DSA)
|
|
|_ 2048 84:d9:48:f5:01:3a:70:6a:58:e2:5b:c5:d7:83:58:ef (RSA)
|
|
80/tcp open http Apache httpd 2.2.15 ((Red Hat))
|
|
| http-methods: Potentially risky methods: TRACE
|
|
|_See http://nmap.org/nsedoc/scripts/http-methods.html
|
|
|_http-title: Test Page for the Apache HTTP Server on Red Hat Enterprise Linux
|
|
135/tcp filtered msrpc
|
|
139/tcp filtered netbios-ssn
|
|
445/tcp filtered microsoft-ds
|
|
593/tcp filtered http-rpc-epmap
|
|
4444/tcp filtered krb524
|
|
6000/tcp open X11 (access denied)
|
|
Service Info: OS: Unix
|
|
|
|
Nmap scan report for 175.45.178.182
|
|
Host is up (0.38s latency).
|
|
Not shown: 992 closed ports
|
|
PORT STATE SERVICE VERSION
|
|
22/tcp open ssh OpenSSH 5.3 (protocol 2.0)
|
|
| ssh-hostkey:
|
|
| 1024 90:15:48:98:36:a2:f8:08:e9:98:81:e9:f0:90:5b:1d (DSA)
|
|
|_ 2048 84:d9:48:f5:01:3a:70:6a:58:e2:5b:c5:d7:83:58:ef (RSA)
|
|
80/tcp open http Apache httpd 2.2.15 ((Red Hat))
|
|
| http-methods: Potentially risky methods: TRACE
|
|
|_See http://nmap.org/nsedoc/scripts/http-methods.html
|
|
|_http-title: Test Page for the Apache HTTP Server on Red Hat Enterprise Linux
|
|
135/tcp filtered msrpc
|
|
139/tcp filtered netbios-ssn
|
|
445/tcp filtered microsoft-ds
|
|
593/tcp filtered http-rpc-epmap
|
|
4444/tcp filtered krb524
|
|
6000/tcp open X11 (access denied)
|
|
Service Info: OS: Unix
|
|
|
|
Nmap scan report for 175.45.178.202
|
|
Host is up (0.38s latency).
|
|
Not shown: 998 filtered ports
|
|
PORT STATE SERVICE VERSION
|
|
80/tcp open http Apache httpd 2.4.17 ((Unix) OpenSSL/1.0.1q PHP/5.6.15 mod_perl/2.0.8-dev Perl/v5.16.3)
|
|
|_http-methods: No Allow or Public header in OPTIONS response (status code 200)
|
|
|_http-title: Site doesn't have a title (text/html; charset=UTF-8).
|
|
113/tcp closed ident
|
|
|
|
Post-scan script results:
|
|
| ssh-hostkey: Possible duplicate hosts
|
|
| Key 2048 84:d9:48:f5:01:3a:70:6a:58:e2:5b:c5:d7:83:58:ef (RSA) used by:
|
|
| 175.45.178.179
|
|
| 175.45.178.180
|
|
| 175.45.178.181
|
|
| 175.45.178.182
|
|
| Key 1024 90:15:48:98:36:a2:f8:08:e9:98:81:e9:f0:90:5b:1d (DSA) used by:
|
|
| 175.45.178.179
|
|
| 175.45.178.180
|
|
| 175.45.178.181
|
|
|_ 175.45.178.182
|
|
Service detection performed. Please report any incorrect results at http://nmap.org/submit/ .
|
|
# Nmap done at Sun Apr 17 21:06:56 2016 -- 1024 IP addresses (9 hosts up) scanned in 415.11 seconds
|